RLSA-2023:5532

Source
https://errata.rockylinux.org/RLSA-2023:5532
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2023:5532.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2023:5532
Related
Published
2023-10-14T02:08:35.099316Z
Modified
2023-10-14T02:09:31.860136Z
Summary
Important: nodejs security and bug fix update
Details

Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

Security Fix(es):

  • nodejs: Permissions policies can be bypassed via Module._load (CVE-2023-32002)

  • nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() (CVE-2023-32006)

  • nodejs: Permissions policies can be bypassed via process.binding (CVE-2023-32559)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • nodejs: Rebase to the latest Nodejs 16 release [rhel-9] (BZ#2236434)
References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:9 / nodejs

Package

Name
nodejs
Purl
pkg:rpm/rocky-linux/nodejs?distro=rocky-linux-9&epoch=1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:16.20.2-1.el9_2